Which of the following is NOT true regarding redundancy?
A) Redundancy occurs when data is repeated several times in a database.
B) When you normalize a database, you eliminate redundancy.
C) Foreign keys are redundant, but no other data about the entity is repeated.
D) Normalization is the process of minimizing duplicate data.
B
You might also like to view...
Answer the following statements true (T) or false (F)
1. The cryptographic hash function is not a versatile cryptographic algorithm. 2. It is possible to use a hash function but no encryption for message authentication. 3. Encryption hardware is optimized toward smaller data sizes. 4. Hash functions are commonly used to create a one-way password file. 5. A weak hash function is sufficient to protect against an attack in which one party generates a message for another party to sign.
The __________ is a layer of software between the applications and the computer hardware that supports applications and utilities.
What will be an ideal response?
SMTP is a protocol for ________
A) archiving messages B) performing backups C) receiving messages D) sending messages
What method of IP network configuration would you use for devices such as servers and printers so that all users on a network will always be able to reach these resources using the same network address?
Dynamic IP address allocation SLAAC DNS DHCPv6 Static IP address allocation